Author:
Hu Gebiao,Lin Zhichi,Guo Zheng,Xu Ruiqing,Zhang Xiao
Publisher
Springer Nature Switzerland
Reference13 articles.
1. Chen, Z., et al.: UAV network intrusion detection method based on spatio-temporal graph convolutional network. J. Beijing Univ. Aeronaut. Astronaut. 47(5), 1068–1076 (2021)
2. Cao, S., et al.: Secure communication in cognitive radio network assisted by cooperative relay and UAV. Comput. Eng. 47(6), 203–209 (2021)
3. Liu, S., He, T., Dai, J.: A survey of CRF algorithm based knowledge extraction of elementary mathematics in Chinese. Mob. Netw. Appl. 26(5), 1891–1903 (2021). https://doi.org/10.1007/s11036-020-01725-x
4. Husnain, G., Anwar, S.: An intelligent probabilistic whale optimization algorithm (i-WOA) for clustering in vehicular ad hoc networks. Int. J. Wireless Inf. Netw. 29(2), 143–156 (2022)
5. Liu, B., Zhu, Q., Zhu, H.: Trajectory optimization and resource allocation for UAV-assisted relaying communications. Wireless Netw. 26(1), 739–749 (2020)